Olympic Games Hit with Cyberattack

  Olympic officials and cybersecurity experts are attributing Internet disruptions during last week’s Olympic opening ceremony were the result of a cyberattack. Jihye Lee, a spokesman for the PyeongChang Organizing Committee, confirmed the news Sunday, saying, “The technology issues experienced Friday night were caused by a cyberattack.”   The first signs of trouble arose when the website and internal systems of the winter games were taken offline during the opening ceremony in PyeongChang on Friday, after hackers detonated their probes inside the network, according to Sky News. News outlets had issues reporting on the event because the hackers knocked out the WiFi. Analysis by researchers at the cybersecurity intelligence wing…

Cybersecurity Tips for Healthcare Organizations

  When you go to a doctor or medical professional, you expect your information to be kept private. That’s because it’s the responsibility of medical organizations to keep your health records confidential. This expectation can be complicated in today’s digital world, especially when healthcare providers face numerous cybersecurity threats from ransomware and other cyber attacks. A recent study found that 72 percent of all healthcare malware attacks in 2016 were ransomware. Healthcare organizations need to have reliable cybersecurity to protect sensitive information. Read on as we detail some savvy cybersecurity tips for healthcare organizations in 2018.   Update cybersecurity procedures and protocols. Employees need to be trained on procedures to…

Cyber Threats Underscore Importance of World Backup Day

Thirty-five years ago, the very first piece of malware came into existence. Created by a 15-year old programmer named Rich Skrenta, “Elk Cloner” was a boot sector virus that targeted the Apple II and spread via floppy disk. A fun prank at the time, Skrenta’s creation would serve as the inspiration for the malicious malware peddled by today’s cybercriminals. With the celebration of World Backup Day on March 31, read on as we detail the importance of protecting your business from malware attacks and why a managed backup solution is the best security option for your data.   At its core, malware is a category of malicious code. According to…

Kansas City Managed Services Firm Reviews Why Internet of Things is Latest Cybersecurity Battleground for Businesses

The internet of things (IoT) has been described as “the infrastructure of the information society.” It’s the internetworking of all ‘connected’ or ‘smart’ electronic devices such as the tablet in your hand, phone in your pocket or the printer in your office, all of these physical devices are embedded with electronics, software, sensors, actuators and network connectivity that enable them to collect and exchange data. Thus, the internet of things. According to Pedro Abreu, chief strategy officer at ForeScout, “The IoT is the new battleground for security.” To Abreu’s point, firms around the world have spent the past two decades using firewalls, antivirus and anti-malware tools to build layers of…

Point of Sales Systems at Risk for Data Breach

Business owners using Point of Sales (POS) systems may need to add extra security. An extremely stealthy malware targeting credit card data has recently been detected which has been identified as Multigrain. This malware uses an integral and essentially unmonitored component of the internet, the Domain Naming System (DNS), to covertly steal information.     A Malware that Uses Undetectable Shortcuts The overwhelming necessity and everyday use of DNS is what makes Multigrain so threatening. FireEye, the cyber security group that discovered Multigrain, said, “Using DNS for data exfiltration provides several advantages to the attacker.” Because DNS is necessary for POS operations, it is “unlikely to be blocked.” Multigrain uses…

Beware of Malware Threats this Holiday Season

The holiday season is a season of giving, but if your company isn’t careful, you could be giving customers malware instead of holiday cheer. While your company has been preparing for the busiest shopping season, cyber criminals have been heavily preparing as well. The holiday season is a time for them to rack in big profits, too. Don’t let hackers spread holiday malware in your company this season by spreading awareness of the following holiday malware schemes to your employees provided by CSO Online. Business email compromise: Cyber criminals will create spoof emails in a bid to execute unauthorized wire transfers. In an FBI report, it was found that thieves…

New Malware Called KeyRaider Targets Jailbroken iPhones

The latest malware threat is not targeting computers, but mobile devices. On Wednesday, September 2, 2015, news broke that more than 225,000 Apple accounts were victims of an iPhone data hack. Hackers hacked the account information using a malware program called KeyRaider. KeyRaider is from China and has now made its way to 18 countries, including the United States. Previously, websites and apps in China had KeyRaider hidden in the software and it was used to hack data from jailbroken iPhones. Now it has expanded to the United States. The data received from the hacks is not kept by the hackers, but offered as an app on iTunes that allows…

Ebola Virus Could Be Coming To Your Inbox

Ebola Virus Could Be Coming To Your Inbox You’ve probably heard about a fair share of viruses that could infect your computer just from clicking a link in your email – from sweepstakes scams to fake password reset links from online shopping sites. Now there’s even more reason to be mindful of the emails you open and links you click: an Ebola hack could be lurking in your inbox. Photo credit: NIAID / Foter / CC BY According to The International Business Times, a new strain of malware is being distributed by hackers in the form of an email from the World Health Organization, WHO. The email is being sent…